A fifth of lost electronic devices have access to work email,exposing confidential corporate information,a Sophos survey has revealed. Some 42%of lost devices do not have any basic security measures in place,according to a survey ...
Tags: electronic devices, work email, security, Sophos
There are concerns about data protection compliance in the public sector, while private organisations are leading the way. That's according to series of reports by the Information Commissioner's Office (ICO). The findings have been ...
Tags: ICO, Essex County Council, data breach, NHS
A parliamentary select committee has confirmed it is looking into Huawei's operations in the UK following controversy around the safety of using the firm's technology. The intelligence and security committee would not go into detail about ...
Tags: Huawei, firm's technology, US congress, data networks
Many companies are not taking into account modern technology and methods when approaching data security, said Cisco senior vice president of security and government, Chris Young, at a press roundtable in London today. Young labelled the ...
Tags: Chris Young, Cisco, Huawei, ZTE
A hacking group that calls itself Team GhostShell this week claimed credit for breaking into servers at 100 major universities from around the world,including Harvard,Stanford,the University of Pennsylvania and the University of Michigan. ...
The companies make and distribute polystyrene(PS)foam trays and polypropylene(PP)rigid trays.These products are widely used for packaging food–such as fish,meat or cheese–in the retail sector. The EC said that these firms ...
Tags: EC, PS foam trays, PP rigid trays, EU antitrust rules
Electric Actuators are designed for those machines which have a huge movement during operation.These actuators slow down the movements and ensure there is stability while functioning;it also ensures that the output delivered is ...
Tags: Electric, Components, Industrial
Jason R.Howe,CEO of Vaporstream Inc.,a Recordless Transitory Communication Service(RTCS)provider that offers private and secure messaging channels for business communications,joins information management and governance professionals at the ...
Tags: Jason R.Howe, Vaporstream, private and secure messaging channels
The night watchman and the IT security guy rarely work together even though their jobs,at the core,are similar:to protect the company.At many organizations,physical and information security remain separate entities by happenstance and by ...
Online cyber criminal markets are putting very sophisticated attack tools into the hands of more low-level attackers, say cyber intelligence specialists. More attackers are now getting their hands on tools like Zeus and SpyEye, according ...
Tags: Online cyber criminal, sophisticated attack tools, Cyber Attack Tools
The Information Commissioner's Office (ICO) has fined Torbay Care Trust (TCT) £175,000 for a data breach it said was "entirely avoidable". The Trust, based in Devon, had published "sensitive details" of over 1,000 employees on its ...
The US Cybersecurity Bill, originally intended to dictate minimum standards of online security for critical infrastructure in the US, has been voted down in the Senate over criticisms that it gave authorities too much power to spy on users. ...
Tags: Cybersecurity Bill, Joe Lieberman, digital Dark Ages, cyber security
European Union cybersecurity agency Enisa has called on service providers and end-users to work together to protect online identities. Passwords protect sensitive information, yet in the first half of 2012 alone, data breaches have ...
Tags: online identities, sensitive information, personal data, passwords safe
WinMagic-sponsored study examined Total Cost of Ownership for full disk encryption for businesses around the world. MISSISSAUGA, ON, July 25, 2012 /24-7PressRelease/ -- WinMagic Inc., the global innovator in full disk encryption, along ...
The number of phishing websites detected reached an all-time high earlier this year, a sign that making fake websites spoofing real ones is still a lucrative trade for cybercriminals. In its latest report, the Anti-Phishing Working Group ...
Tags: Malware, Vulnerabilities, phishing website, APWG